{"id":19808,"date":"2022-08-10T03:21:26","date_gmt":"2022-08-10T11:21:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/10\/news-13541\/"},"modified":"2022-08-10T03:21:26","modified_gmt":"2022-08-10T11:21:26","slug":"news-13541","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/08\/10\/news-13541\/","title":{"rendered":"Lockbit, Hive, and BlackCat attack automotive supplier in triple ransomware attack"},"content":{"rendered":"<p><strong>Credit to Author: Matt Wixey| Date: Wed, 10 Aug 2022 11:00:50 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>In May 2022, an automotive supplier was hit with three separate ransomware attacks. All three threat actors abused the same misconfiguration \u2013 a firewall rule exposing Remote Desktop Protocol (RDP) on a management server \u2013 but used different ransomware strains and tactics.<\/p>\n<p>The first ransomware group, identified as <a href=\"https:\/\/news.sophos.com\/en-us\/tag\/lockbit-ransomware\/\">Lockbit<\/a>, exfiltrated data to the <a href=\"https:\/\/news.sophos.com\/en-us\/tag\/mega\/\">Mega<\/a> cloud storage service, used <a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000039774?language=en_US\">Mimikatz<\/a> to extract passwords, and distributed their ransomware binary using <a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/psexec\">PsExec<\/a>.<\/p>\n<p>The second group, identified as Hive, used RDP to move laterally, before dropping their ransomware just two hours after the Lockbit threat actor.<\/p>\n<p>As the victim restored data from backups, an <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/07\/14\/blackcat-ransomware-attacks-not-merely-a-byproduct-of-bad-luck\/\">ALPHV\/BlackCat<\/a> affiliate accessed the network, installed <a href=\"https:\/\/www.atera.com\/remote-monitoring-and-management\/\">Atera Agent<\/a> (a legitimate remote access tool) to establish persistence, and exfiltrated data. Two weeks after the Lockbit and Hive attacks, the threat actor distributed their ransomware, and cleared Windows Event Logs. Sophos\u2019 Rapid Response (RR) team investigated, and found several files which had been encrypted multiple times \u2013 as many as five in some instances.<a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86265 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png\" alt=\"A screenshot showing files encrypted five times - twice each by Lockbit and Hive, and once by BlackCat\" width=\"1029\" height=\"418\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png 2587w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=300,122 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=768,312 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=1024,416 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=1536,625 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=2048,833 2048w\" sizes=\"auto, (max-width: 1029px) 100vw, 1029px\" \/><\/a><\/p>\n<p><em>Figure 1: Files which had been encrypted five times \u2013 twice each by Lockbit and Hive, and once by ALPHV\/BlackCat<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86267 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png\" alt=\"A timeline showing the attacks by the three ransomware groups\" width=\"903\" height=\"519\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png 2400w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png?resize=300,173 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png?resize=768,442 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png?resize=1024,589 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png?resize=1536,883 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/MicrosoftTeams-image.png?resize=2048,1178 2048w\" sizes=\"auto, (max-width: 903px) 100vw, 903px\" \/><\/a><\/p>\n<p><em>Figure 2: The multi-attacker timeline discovered by Sophos X-Ops<\/em><\/p>\n<p>We\u2019ve covered several <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/28\/conti-and-karma-actors-attack-healthcare-provider-at-same-time-through-proxyshell-exploits\/\">dual ransomware attacks<\/a> before \u2013 and <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/q6r6n3x43mnrfchn5tfh3qmw\/sophos-x-ops-active-adversary-multiple-attackers-wp.pdf\">recently investigated the phenomenon of multiple attacks more generally<\/a>, as it\u2019s something which <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/07\/active-adversary-playbook-2022\/\">appears to be increasingly common<\/a> \u2013 but this is the first incident we\u2019ve seen where three separate ransomware actors used the same point of entry to attack a single organization.<\/p>\n<h3>Locks, bees, and cats: The perfect storm<\/h3>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86277 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png\" alt=\"Profiles of the three ransomware groups\" width=\"987\" height=\"567\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png 2400w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png?resize=300,173 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png?resize=768,442 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png?resize=1024,589 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png?resize=1536,883 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/profiles.png?resize=2048,1178 2048w\" sizes=\"auto, (max-width: 987px) 100vw, 987px\" \/><\/a><\/p>\n<p><em>Figure 3: A brief overview of the three ransomware groups that consecutively attacked one organization<\/em><\/p>\n<p>While the attacks took place in May, we discovered that a threat actor established an RDP session on the organization\u2019s domain controller, way back in December 2021. This might have been an initial access broker (IAB) \u2013 an attacker who finds vulnerable systems and sells access to them on criminal marketplaces \u2013 or an early scouting mission by one of the three threat actors.<\/p>\n<p>Either way, in mid-April 2022, a Lockbit affiliate gained RDP access to the organization\u2019s corporate environment through an exposed management server.<\/p>\n<p>Next, the threat actor moved laterally to a domain controller and other hosts, and began exfiltrating data to the Mega cloud storage service, as well as executing two PowerShell scripts: <strong>sharefinder.ps1<\/strong> (to gather information about connected domain network shares) and <strong>invoke-mimikatz.ps1<\/strong> (to extract passwords from LSASS, the Local Security Authority Subsystem Service).<\/p>\n<p>On May 1st, the Lockbit affiliate created two batch scripts (<strong>1.bat<\/strong> and <strong>2.bat<\/strong>) to distribute the ransomware binaries <strong>LockBit_AF51C0A7004B80EA.exe<\/strong> and <strong>Locker.exe<\/strong> across the network, via PsExec.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/1-bat.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-86271 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/1-bat.png\" alt=\"A screenshot of a batch script, 1.bat, used by the attackers\" width=\"638\" height=\"265\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/1-bat.png 638w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/1-bat.png?resize=300,125 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a><em>Figure 4: 1.bat script<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/2-bat.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-86272\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/2-bat.png\" alt=\"A screenshot of a batch script, 2.bat, used by the attackers\" width=\"633\" height=\"266\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/2-bat.png 619w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/2-bat.png?resize=300,126 300w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><\/a><\/p>\n<p><em>Figure 5: 2.bat script<\/em><\/p>\n<p>Upon execution, the ransomware encrypted files on nineteen hosts and dropped ransom notes entitled <strong>Restore-My-Files.txt<\/strong>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86275 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png\" alt=\"A ransom note from the Lockbit ransomware group\" width=\"969\" height=\"218\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png 1518w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png?resize=300,67 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png?resize=768,173 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/lockbit-note.png?resize=1024,230 1024w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/><\/a><\/p>\n<p><em>Figure 6: The Lockbit ransom note<\/em><\/p>\n<p>Two hours later, while the Lockbit threat actor was still encrypting files, a Hive ransomware affiliate gained access to the network via the same exposed RDP server and used RDP to move laterally to other hosts.<\/p>\n<p>Hive used legitimate software (<strong>PDQ Deploy<\/strong>) already installed on the network to distribute its ransomware binary <strong>windows_x32_encrypt.exe<\/strong>. This tactic, <a href=\"https:\/\/ai.sophos.com\/2021\/12\/14\/lol-youre-not-executing-that-detecting-malicious-lolbin-command-executions\/\">known as \u2018living off the land\u2019<\/a>, is popular among threat actors &#8211; particularly ransomware actors &#8211; as it has a small footprint and is less likely to be detected than downloading malicious tools.<\/p>\n<p>Hive\u2019s ransomware binary encrypted files on sixteen hosts and dropped a further ransom note, <strong>HOW_TO_DECRYPT.txt<\/strong>, on impacted devices.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/hive-note.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86274 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/hive-note.png\" alt=\"A ransom note from the Hive ransomware group\" width=\"726\" height=\"601\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/hive-note.png 1018w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/hive-note.png?resize=300,248 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/hive-note.png?resize=768,636 768w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/a><\/p>\n<p><em>Figure 7: The Hive ransom note<\/em><\/p>\n<p>At this point, the organization\u2019s IT team restored most of the infected systems to April 30, the day before the Lockbit threat actor began to encrypt files. From an investigative perspective, this meant some crucial evidence was lost. But the attacks were not over yet.<\/p>\n<p>Only a day after that system restore, an ALPHV\/BlackCat affiliate arrived, making RDP connections to domain controllers, file servers, application servers, and other hosts &#8211; all from the same management server exploited by Lockbit and Hive.<\/p>\n<p>The ALPHV\/BlackCat threat actor exfiltrated data to Mega over the course of a week, and established persistence by installing a backdoor: a legitimate remote access tool named <strong>Atera Agent<\/strong>. On May 15th \u2013 two weeks after the Lockbit and Hive attacks \u2013 the ALPHV\/BlackCat affiliate used the credentials of a compromised user to drop ransomware binaries <strong>fXXX.exe<\/strong> and <strong>fXXXX.exe<\/strong> on six hosts, leaving a ransom note titled <strong>RECOVER-eprzzxl-FILES.txt<\/strong> in every folder.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86273 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png\" alt=\"A ransom note from the ALPHV\/BlackCat ransomware group\" width=\"869\" height=\"572\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png 1326w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png?resize=300,198 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png?resize=768,506 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/blackcat-note.png?resize=1024,674 1024w\" sizes=\"auto, (max-width: 869px) 100vw, 869px\" \/><\/a><\/p>\n<p><em>Figure 8: The ALPHV\/BlackCat ransom note<\/em><\/p>\n<p>Based on analysis from SophosLabs researchers, these binaries not only encrypted files but also deleted volume shadow copies and Windows Event logs. This further complicated our subsequent investigation, as the ALPHV\/BlackCat actor erased not only logs relating to their attack, but also those relating to the attacks by Lockbit and Hive.<\/p>\n<p>It&#8217;s not clear why Lockbit and ALPHV\/BlackCat deployed two ransomware binaries, but one possible reason is fault tolerance: If one executable is detected or blocked, or fails to encrypt, the second might act as a back-up.<\/p>\n<h3>Key features of the BlackCat ransomware binaries<\/h3>\n<p>The two BlackCat ransomware binaries, <strong>fXXX.exe<\/strong> and <strong>fXXXX.exe<\/strong>, have the following functionality:<\/p>\n<ul>\n<li>Encrypt files and add the extension <strong>.eprzzxl<\/strong><\/li>\n<li>Collect Universally Unique IDs (UUIDs) from the impacted devices:<\/li>\n<\/ul>\n<pre>wmic csproduct get UUID<\/pre>\n<ul>\n<li>Enable Remote to Local and Remote to Remote symbolic link evaluations that allow easy access to files and folders in remote locations:<\/li>\n<\/ul>\n<pre>fsutil behavior set SymlinkEvaluation R2L:1  fsutil behavior set SymlinkEvaluation R2R:1<\/pre>\n<ul>\n<li>Modify a registry key to allow the maximum number of network requests by remote processes:<\/li>\n<\/ul>\n<pre>reg add HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters \/v MaxMpxCt \/d 65535 \/t REG_DWORD \/f<\/pre>\n<ul>\n<li>Delete Volume Shadow copies:<\/li>\n<\/ul>\n<pre>vssadmin.exe Delete Shadows \/all \/quiet<\/pre>\n<ul>\n<li>Disable Windows automatic repair on the impacted device<\/li>\n<\/ul>\n<pre>bcdedit \/set {default} recoveryenabled No<\/pre>\n<ul>\n<li>Clear Windows Event logs<\/li>\n<\/ul>\n<pre>cmd.exe \/c for \/F \"tokens=*\" %1 in ('wevtutil.exe el') DO wevtutil.exe cl \"%1\"  <\/pre>\n<h3>The aftermath<\/h3>\n<p>After the dust had settled, Sophos\u2019 RR team found files that had been encrypted by all three ransomware groups. In fact, as shown in the screenshot below, some files had even been encrypted five times! Because the Hive attack started 2 hours after Lockbit, the Lockbit ransomware was still running &#8211; so both groups kept finding files without the extension signifying that they were encrypted.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-86265 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png\" alt=\"A screenshot showing quintuple-encrypted files\" width=\"940\" height=\"382\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png 2587w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=300,122 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=768,312 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=1024,416 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=1536,625 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/triple-ransomware-annotated.png?resize=2048,833 2048w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<p><em>Figure 9: An example of quintuple-encrypted files<\/em><\/p>\n<p>However, despite all three ransomware groups being known for <a href=\"https:\/\/darktrace.com\/blog\/double-extortion-ransomware\">\u2018double extortion\u2019 techniques<\/a> (where, in addition to encrypting files, threat actors threaten to publish the victim\u2019s data if the ransom is not paid), no information was published on any of the groups\u2019 leak sites.<\/p>\n<p>Several things complicated this investigation. The system restoration, BlackCat\u2019s log-wiping, and a lack of DHCP logging all contrived to make piecing together the attacks extremely difficult. Despite these challenges, Sophos\u2019 Rapid Response team was able to gather and analyze the evidence left behind.<\/p>\n<p>When it comes to defense, there are two elements: proactive (following security best practices to minimize the risk of being attacked), and reactive (how to recover quickly and safely if an attack does happen).<\/p>\n<p>On the proactive side, <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/q6r6n3x43mnrfchn5tfh3qmw\/sophos-x-ops-active-adversary-multiple-attackers-wp.pdf\">our white paper on multiple attackers<\/a> includes several learning points and best-practice guidance, including:<\/p>\n<ol>\n<li><strong>Patch and investigate.<\/strong> Keep Windows and other software up to date (and consider setting up some vulnerability alerts, and monitoring in-the-know sources, to get a head start on breaking news about new bugs). This also means double-checking that patches have been installed correctly and are in place for critical systems like internet-facing machines or domain controllers. Patching early is the best way to avoid being compromised in the future \u2013 but it doesn\u2019t mean that you haven\u2019t already been attacked. It\u2019s always worth investigating to ensure that your organization wasn\u2019t breached prior to patching. Threat actors may leave backdoors (which may include the installation of legitimate software) or introduce new vulnerabilities, either deliberately or inadvertently, so this is a key thing for responders to look for to reduce the likelihood of a second attack.<\/li>\n<li><strong>Lock down accessible services.<\/strong> Perform scans of your organization&#8217;s network from the outside and identify and lock down the ports commonly used by VNC, RDP, or other remote-access tools. If a machine needs to be reachable using a remote management tool, put that tool behind a VPN or zero-trust network access solution that uses MFA as part of its login. It\u2019s also worth remembering that attacks can happen more than once; if an access point remains open, other threat actors are likely to find and exploit it.<\/li>\n<li><strong>Practice segmentation and zero-trust.<\/strong> Separate critical servers from each other and from workstations by putting them into separate VLANs as you work towards a zero-trust network model.<\/li>\n<li><strong>Set and enforce strong passwords and multifactor authentication (MFA).<\/strong> Strong passwords serve as one of the first lines of defense. Passwords should be unique or complex and never re-used. This is easier to do if you provide staff with a password manager that can store their credentials. But even strong passwords can be compromised. Any form of multifactor authentication is better than none for securing access to critical resources such as e-mail, remote management tools, and network assets.<\/li>\n<li><strong>Inventory your assets and accounts.<\/strong> Unprotected and unpatched devices in the network increase risk and create a situation where malicious activities could pass unnoticed. It is vital to have a current inventory of all connected computers and IoT devices. Use network scans and physical checks to locate and catalog them.<\/li>\n<li><strong>Install layered protection to block attackers at as many points as possible.<\/strong> Extend that security to all endpoints that you allow onto your network.<\/li>\n<\/ol>\n<p>But once threat actors are inside a network, there\u2019s not much that can be done to \u2018stop the bleeding\u2019 without having comprehensive Incident Response and remediation plans, and taking immediate action. We\u2019ve written a series of articles called \u2018<a href=\"https:\/\/news.sophos.com\/en-us\/tag\/hindsight-security\/\">Hindsight security: Actions breach victims wish they had taken sooner\u2019<\/a>, which includes advice on securing RDP, enforcing MFA, setting up an incident response plan, and more. You can also request a copy of the Sophos Incident Response Guide <a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/incident-response-guide\">here<\/a>.<\/p>\n<h3>IOCs<\/h3>\n<p>Sophos X-Ops has posted IOCs relating to the <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Ransomware_Lockbit%20-%20triple%20ransomware%20attack.csv\">Lockbit<\/a>, <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Ransomware_Hive%20-%20triple%20ransomware%20attack.csv\">Hive<\/a>, and <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Ransomware_BlackCat%20-%20triple%20ransomware%20attack.csv\">BlackCat<\/a> attacks covered in this report on our Github repository.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/08\/10\/lockbit-hive-and-blackcat-attack-automotive-supplier-in-triple-ransomware-attack\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/08\/door-lock-g523516d48_1920.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Wixey| Date: Wed, 10 Aug 2022 11:00:50 +0000<\/strong><\/p>\n<p>After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks \u2013 1 entry point.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[26446,25303,129,25098,24616,3765,24552,27030],"class_list":["post-19808","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-active-adversary-playbook","tag-blackcat","tag-featured","tag-hive","tag-lockbit","tag-ransomware","tag-security-operations","tag-sophos-x-ops"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19808"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19808\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}